diff options
-rw-r--r-- | c_src/monocypher_nif.c | 19 |
1 files changed, 5 insertions, 14 deletions
diff --git a/c_src/monocypher_nif.c b/c_src/monocypher_nif.c index 7e25d90..c8390e2 100644 --- a/c_src/monocypher_nif.c +++ b/c_src/monocypher_nif.c @@ -10,7 +10,6 @@ static ERL_NIF_TERM crypto_lock_nif(ErlNifEnv* env, int argc, const ERL_NIF_TERM argv[]) { - ErlNifBinary mac; if(!enif_inspect_binary(env, argv[0], &mac)) { return enif_make_badarg(env); @@ -57,7 +56,6 @@ static ERL_NIF_TERM crypto_lock_nif(ErlNifEnv* env, int argc, const ERL_NIF_TERM static ERL_NIF_TERM crypto_unlock_nif(ErlNifEnv* env, int argc, const ERL_NIF_TERM argv[]) { - ErlNifBinary key; if(!enif_inspect_binary(env, argv[0], &key)) { return enif_make_badarg(env); @@ -96,7 +94,7 @@ static ERL_NIF_TERM crypto_unlock_nif(ErlNifEnv* env, int argc, const ERL_NIF_TE // create a new binary for the plain_text ERL_NIF_TERM plain_text_term; unsigned char* plain_text = enif_make_new_binary(env, cipher_text.size, &plain_text_term); - + int unlock_return_value = crypto_unlock(plain_text, key.data, nonce.data, mac.data, cipher_text.data, cipher_text.size); if (unlock_return_value == 0) { @@ -110,7 +108,6 @@ static ERL_NIF_TERM crypto_unlock_nif(ErlNifEnv* env, int argc, const ERL_NIF_TE static ERL_NIF_TERM crypto_blake2b_nif(ErlNifEnv* env, int argc, const ERL_NIF_TERM argv[]) { - ERL_NIF_TERM hash_term; unsigned char* hash = enif_make_new_binary(env, 64, &hash_term); @@ -126,7 +123,6 @@ static ERL_NIF_TERM crypto_blake2b_nif(ErlNifEnv* env, int argc, const ERL_NIF_T static ERL_NIF_TERM crypto_blake2b_general_nif(ErlNifEnv* env, int argc, const ERL_NIF_TERM argv[]) { - size_t hash_size; if (!enif_get_ulong(env, argv[0], &hash_size)) { return enif_make_badarg(env); @@ -139,7 +135,7 @@ static ERL_NIF_TERM crypto_blake2b_general_nif(ErlNifEnv* env, int argc, const E ERL_NIF_TERM hash_term; unsigned char* hash = enif_make_new_binary(env, hash_size, &hash_term); - + ErlNifBinary key; if(!enif_inspect_binary(env, argv[1], &key)) { return enif_make_badarg(env); @@ -150,7 +146,6 @@ static ERL_NIF_TERM crypto_blake2b_general_nif(ErlNifEnv* env, int argc, const E return enif_make_badarg(env); } - ErlNifBinary message; if(!enif_inspect_binary(env, argv[2], &message)) { return enif_make_badarg(env); @@ -166,7 +161,6 @@ static ERL_NIF_TERM crypto_blake2b_general_nif(ErlNifEnv* env, int argc, const E static ERL_NIF_TERM crypto_ietf_chacha20_nif(ErlNifEnv* env, int argc, const ERL_NIF_TERM argv[]) { - ErlNifBinary plain_text; if(!enif_inspect_binary(env, argv[0], &plain_text)) { return enif_make_badarg(env); @@ -200,7 +194,6 @@ static ERL_NIF_TERM crypto_ietf_chacha20_nif(ErlNifEnv* env, int argc, const ERL static ERL_NIF_TERM crypto_ietf_chacha20_ctr_nif(ErlNifEnv* env, int argc, const ERL_NIF_TERM argv[]) { - ErlNifBinary plain_text; if(!enif_inspect_binary(env, argv[0], &plain_text)) { return enif_make_badarg(env); @@ -242,7 +235,6 @@ static ERL_NIF_TERM crypto_ietf_chacha20_ctr_nif(ErlNifEnv* env, int argc, const static ERL_NIF_TERM crypto_ed25519_public_key_nif(ErlNifEnv* env, int argc, const ERL_NIF_TERM argv[]) { - ErlNifBinary secret_key; if(!enif_inspect_binary(env, argv[0], &secret_key)) { return enif_make_badarg(env); @@ -262,7 +254,6 @@ static ERL_NIF_TERM crypto_ed25519_public_key_nif(ErlNifEnv* env, int argc, cons static ERL_NIF_TERM crypto_ed25519_sign_nif(ErlNifEnv* env, int argc, const ERL_NIF_TERM argv[]) { - ErlNifBinary secret_key; if(!enif_inspect_binary(env, argv[0], &secret_key)) { return enif_make_badarg(env); @@ -271,7 +262,7 @@ static ERL_NIF_TERM crypto_ed25519_sign_nif(ErlNifEnv* env, int argc, const ERL_ if(secret_key.size != 32) { return enif_make_badarg(env); } - + ErlNifBinary public_key; if(!enif_inspect_binary(env, argv[1], &public_key)) { return enif_make_badarg(env); @@ -290,7 +281,7 @@ static ERL_NIF_TERM crypto_ed25519_sign_nif(ErlNifEnv* env, int argc, const ERL_ unsigned char* signature = enif_make_new_binary(env, 64, &signature_term); crypto_ed25519_sign(signature, secret_key.data, public_key.data, message.data, message.size); - + return signature_term; } @@ -304,7 +295,7 @@ static ERL_NIF_TERM crypto_ed25519_check_nif(ErlNifEnv* env, int argc, const ERL if(signature.size != 64) { return enif_make_badarg(env); } - + ErlNifBinary public_key; if(!enif_inspect_binary(env, argv[1], &public_key)) { return enif_make_badarg(env); |